It is a well known fact that wireless connections are by nature insecure. Your chances of being snooped on and valuable data stolen from you is very high, even in the most secure setups. It's even more likely in a public setting such as an internet cafe or a wireless hotspot. That is why good solutions are needed to ensure that your wireless connections are as secure as they can be.
We all know that when you simply delete a file, it’s possible to recover it later. Sometimes this is useful, if you accidentally delete something important; but usually this is a problem, and you really want that file gone forever. This howto will explain how to delete a file in linux securely and permanently, so it can never be recovered.
On a typical Linux system there will be at least two, if not more, directories or partitions meant to hold temporary files. There is always the /tmp directory, and often a /var/tmp directory as well. With newer Linux kernels, there can also be /dev/shm, which is mounted using the tmpfs filesystem.
Nmap, or the Network Mapper, is a powerful command-line tool for diagnosing network problems, finding security vulnerabilities, and host of other uses. Intricate knowledge of its use is crucial to systems administrators, but its many options and scanning methods can be daunting to even the most experienced of end users. nmapFE, or the nmap Front End, is a graphical interface for nmap that makes it easy to use even the most powerful aspects of the network mapper, and can be a life-saver when you run into networking problems.
One of the main reasons people move from Windows to Linux is the promise of greater security from malware on the Internet. Everyone knows you need to add extra security to try to keep a Windows desktop safe, but what do you have to do to accomplish the same thing on Linux? To answer that question, we asked a number of well-known Linux kernel hackers and a security expert for their thoughts on the matter.
If you run an ssh server on your Ubuntu system, and allow password based authentication, then you’ll want to install DenyHosts. It watches the log files and blocks the IP address of those who fail to authenticate too many time. As always, while this article is Ubuntu oriented, the same basic procedure works on other distros.
AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system. It attempts to restrict processes to those resources that the process requires to function only. AppArmor will not only define the system resources a program can access , it will also determine the privileges with which it can access those resources. To protect applications you will need to set up a security profile for each application that you want to protect.